Skip to main content
  • Book
  • © 2011

Moving Target Defense

Creating Asymmetric Uncertainty for Cyber Threats

Part of the book series: Advances in Information Security (ADIS, volume 54)

Buy it now

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (10 chapters)

  1. Front Matter

    Pages i-xv
  2. A Formal Model for a System’s Attack Surface

    • Pratyusa K. Manadhata, Jeannette M. Wing
    Pages 1-28
  3. Effectiveness of Moving Target Defenses

    • David Evans, Anh Nguyen-Tuong, John Knight
    Pages 29-48
  4. Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution

    • Georgios Portokalidis, Angelos D. Keromytis
    Pages 49-76
  5. Compiler-Generated Software Diversity

    • Todd Jackson, Babak Salamat, Andrei Homescu, Karthikeyan Manivannan, Gregor Wagner, Andreas Gal et al.
    Pages 77-98
  6. Symbiotes and defensive Mutualism: Moving Target Defense

    • Ang Cui, Salvatore J. Stolfo
    Pages 99-108
  7. End-to-End Software Diversification of Internet Services

    • Mihai Christodorescu, Matthew Fredrikson, Somesh Jha, Jonathon Giffin
    Pages 117-130
  8. Back Matter

    Pages 183-183

About this book

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more.

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

Editors and Affiliations

  • Center for Secure Information Systems, George Mason University, Fairfax, USA

    Sushil Jajodia, Anup K. Ghosh

  • The MITRE Corporation, McLean, USA

    Vipin Swarup

  • Computing and Information Science Div., Engineering Sciences Directorate, Triangle Park, USA

    Cliff Wang

  • Division of Information & Intelligent Sy, National Science Foundation, Arlington, USA

    X. Sean Wang

Bibliographic Information

Buy it now

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access